The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.[2] The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.

System Requirements:

2 Linux machines networked together.

SSH Client and Server versions – openssh-clients package is included in the default installations of most Linux distributions, the server version can be download from the EPEL repository, please follow our guide of how to add EPEL repository into your machine in order to do so.

sftp –

sftp is an interactive command which uses the same syntax as a standard command-line ftp client. It differs from a standard ftp client in that the authentication and the data transfer happen through the SSH protocol rather than the FTP protocol. The SSH protocol is encrypted whereas the FTP protocol is not.

If you want to avoid entering your passwords time after time when connecting to remote machines while using ssh / scp / sftp , follow our How To: Allow auto login between Linux machines article. I hope you like this article, please feel free to leave comments or ask questions.